Try Our New BETA Version
GO
Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 402 (0.434 secs)
You searched for: subject:"cyber security"
[1] 2 3 4 5 6 7 8 9     Next    Last
[audio]Sandy Bacik webinar
Cyber security
Keywords: cyber security
Downloads: 18
[texts]201203 FT Security Redux - Digit
Fastrack to Security Redux
Keywords: Cyber Security
Downloads: 17
[movies]▶ Active Cyber Intelligence You Tube [ 720p]
Cyber security assessments and advice that keep information confidential, maintain its integrity, and make it available to use in business processes and operations.Visit for more info @ http://www.qinetiq.com/services-products/cyber/Pages/security-consulting.aspx
Keywords: cyber security uk; cyber security
Downloads: 7
[texts]Cyber-Security Industry - Global Forecast & Trends to 2017
Cyber Security is projected to be among the fastest growing segments of the Information Technology (IT) sector in the next 3 to 5 years, with significant potential investments from companies to secure their computing environment. Cyber security providers offer systematic method to guarantee vulnerabilities and threats are blocked at each layer through application of industry compliant security products and services...
Keywords: Cyber Security; Cyber Security Market; Cyber Security Industry; Cyber Security Tends; Global Cyber Security
Downloads: 8
[audio]Sandy Bacik Webinar
âCompliance, Audit, Risk, Security â whatâs the difference and why do we need it,?â November 3, 2011
Keywords: Smart Grid; cyber security
Downloads: 1
[audio]Sandy Bacik webinar recording
Sandy Bacik webinar recording from 10/20
Keywords: webinar; cyber security
Downloads: 17
[texts]businessSecurity
A professional, well-operated locksmith company will respond quickly and courteously to all calls, no matter how minor the situation may seem. Providing elderly care is one of the many responsibilities which are inescapable amongst children. This requires emotional, financial, physical and psychological readiness on your part. More so, it requires preparation of best home security you can ever think of...
Keywords: Business cyber security
Downloads: 1
[texts]ART 16, 02.15 World Banking System Hacked.... - Piotr Grzywacz
Amazing Radio Toronto - daily evening show.
Keywords: Investigative Journalism. Cyber Security
Downloads: 1
[audio]How To Remove The International Cyber Security Protection Alliance Virus
How to remove the International Cyber Security Protection Alliance VirusSource(S): http://guides.yoosecurity.com/
Keywords: Cyber Security Protection
Downloads: 5
[movies]Cyber Security Challenges : CSPAN2 : November 11, 2014 11:05pm-11:07pm EST
The U.S. Chamber of Commerce presents its third annual Cybersecurity Summit; Panelists talks about cybersecurity threats and potential solutions.
Keywords: Cyber Security Challenges; Television Program
[movies]Qineti Q's Cyber Security Challenge[ 1]
QinetiQ cyber security business provides advice and services on insider threat management and Monitoring networks continuously to identify the tell-tale signs of an APT breach. QinetiQ helps customers protect themselves against APTs by putting in place intelligent .Visit for more info @ http://www.qinetiq.com/services-products/cyber/Pages/advanced-persistent-threat-detection.aspx
Keywords: Cyber Crime; Cyber Security Threats
Downloads: 3
[movies]hass and associates cyber security - Brooke Austin
hass and associates cyber security This is one birth of a baby we are not supposed to feel happy about, the birth of the Royal baby. This will deliver viruses around the world and will target you mobiles and tablets. Innocence isnât an excuse besides staying safe online is easy as 1 2 3. Start by being familiar of the online threats expected to be born this year. Madware shorter term for mobile ware is one of the cyber threats you should be aware of...
Keywords: hass and associates cyber security
Downloads: 41
[texts]Global Aviation Cyber Security Market - TechNavio
Cyber security threats are internet-based attempts to disrupt or damage IT systems and hack critical information using spyware, malware, and phishing. With the increasing use of mobile devices and applications, cyber threats are becoming a major concern for the Aviation sector. 
Keywords: Global Aviation Cyber Security Market
Downloads: 1
[movies]Cyber Security Cooperation : CSPAN2 : November 12, 2014 1:45am-3:01am EST
Panelists discuss strategies to strengthen cyber security.
Keywords: Cyber Security Cooperation; Television Program
Downloads: 3
[texts]Global Cyber Security Industry - Emerging Trends and Investment Outlook 2014
The Report “Cyber Security – Emerging Trends and Investment Outlook” by Strategic Defense Intelligence is now available at ReportsnReports.com Contact sales@rnrmarketresearch.com    with “Cyber Security – Emerging Trends and Investment Outlook ″ in subject line and your contact details to purchase this report or get your questions answered.The collection of ‘Cyber Security ‘market research reports has a new addition of “Cyber Security – Emerging Trends and Investment Out...
Keywords: Cyber Security; Cyber Security market; Cyber Security industry; public sector; security
Downloads: 2
[texts]Global Middle East Cyber Security Market: Forecasts,Analysis
It is expected that the Middle East cyber security market will show enormous growth with credence in the coming years. Major players in the cyber security ecosystem include Booz Allen Hamilton, Cisco, CSC, Cassidian, IBM, Kaspersky, McAfee, Symantec, Trend Micro and various others. Complete report available @ http://www.rnrmarketresearch.com/middle-east-cyber-security-market-by-technologies-iam-dlp-utm-idsips-firewall-risk-compliance-management-antivirus-svmsiem-disaster-recovery-ddos-mitigation...
Keywords: Middle East Cyber Security; Cyber Security; Middle East Cyber Security Market; Firewall; Risk & Compliance Management
Downloads: 10
[texts]Global Cyber Security Market Analysis and Opportunity Assessment; 2014 - 2020 - Future Market Insights
Cyber security, also known as information technology security, is a set of technological processes and practices designed to protect or defend computers, programmes, network and data from attack, unauthorized access, changeor damage. The benefits of employing such a technology comprise protecting networks, computer and data from unauthorized access, faster recovery times in event of disruption, higher confidence in stakeholders, improved information security and business continuity management, p...
Keywords: cyber security market; global cyber security solutions market; global cyber security market
Downloads: 3
[texts]Europe Cyber Security Market
The European cyber security market is expected to grow from $25.04 billion in 2014 to $35.53 billion in 2019, at a CAGR of 7.2% for the period 2014 to 2019.
Keywords: Europe Cyber Security Market Report; Cyber Security Market report; Cyber Security Market
Downloads: 3
[texts]Aviation Cyber Security Market Worldwide Report 2015 2019 - ReportsnReports
Cyber threats are internet-based attempts to disrupt or damage IT systems and hack critical information using spyware, malware, and phishing. Cyber security solutions help organizations in the Aviation sector detect, monitor, report, and counter cyber threats while maintaining the confidentiality of IT systems. Aviation cyber security solutions help protect critical data or any kind of digital asset stored on a computer or in a digital memory device...
Keywords: Global Aviation Cyber Security Market; Aviation Cyber Security Market; Aviation Cyber Security Market research report; Aviation Cyber Security industry; Aviation Cyber Security Market analysis; Aviation Cyber Security Market growth report
Downloads: 1
[texts]Network Security Market
The Network Security Management Market research report addresses the needs and challenges of implementing security for network. It reviews the key market players and vendors that provide network security and future scope, drivers, restrain and challenges of the market. The report also analyzes the global adoption trends and growth potential across various geographies.
Keywords: Network Security Market; Cyber Security; Information Security
Downloads: 7
[texts]Global Cyber Security Market 2014 2018
Complete Report is Available @ http://www.sandlerresearch.org/global-cyber-security-market-2014-2018.html .   Global Cyber Security Market 2014-2018 is the latest addition to Sandlerresearch.org industry research reports collection. This report covers the present scenario and the growth prospects of the Global Cyber Security market for the period 2014-2018. To calculate the market size, the report considers revenue generated from sales of cyber security solutions...
Keywords: Global Cyber Security Market; Global Cyber Security industry; Cyber Security Market; Cyber Security industry; cloud-based Cyber Security market; Cyber security systems growth; hybrid Cyber Security market; Cyber Security monitoring market; Cyber Security resolving market; market research reports; industry research reports
Downloads: 18
[audio]BITE307 - BOGGS
Happy birthday to the Secretary of State, and Leon Panetta stands by Rummy
Keywords: Clinton; birthday; Panetta; Okinawa; Guam; cyber security
Downloads: 62
[audio]Staying Ahead Of The Cyber Security Game Part 1 - Sogeti UK
Erik van Ommeren, Director of Innovation and co-author of our latest publication ‘Staying Ahead in the Cyber Security Game’ has a discussion with Sogeti UK’s Marketing Manager, Samantha Mills. In this short podcast, Erik shares the trends, opportunities and threats we are currently seeing in the security landscape. Erik also explores important themes from his new Cyber Security book using examples throughout.
Keywords: technology; software testing; cyber security; security; cyber
Downloads: 5
[texts]The Latin America Cyber Security - Micromarketmonitor
The Latin America Cyber Security report defines and segments the cyber security solutions and services market in Latin America with analysis and forecast of revenue
Keywords: The Latin America Cyber Security market report; The Latin America Cyber Security market forecast; The Latin America Cyber Security market trend
Downloads: 1
[movies]Senators Feinstein and Chambliss on Cyber-Security Legislation : CSPAN2 : November 12, 2014 1:10am-1:46am EST
Senators Dianne Feinstein (D) and Saxby Chambliss (R) discuss cyber-security legislation and the status of the Cybersecurity Information Sharing Act (CISA).
Keywords: Senators Feinstein and Chambliss on Cyber-Security Legislation; Television Program
[texts]Unified Threat Management Market
Unified threat management (UTM) is a comprehensive solution that has recently emerged in the network security industry, and since 2004 it has gained widespread currency as a primary network gateway defense solution for organizations. UTM is the evolution of the traditional firewall into a security product which perform multiple security functions within one single appliance like network firewalling, network intrusion prevention and gateway antivirus (AV), gateway anti-spam, etc...
Keywords: Unified Threat Management Market; Virtual Private Network (VPN); Cyber Security
Downloads: 3
[audio]Airstripone Podcast 3 (Audio Only) - Airstripone1984
Podcast 3 focuses on the notion of a cyber security threat as a pre-text to clamp down on the internet and change the web as we know it. This episode focuses on internet control and censorship. Visit our website: www.airstripone1984.wordpress.com
Keywords: Cyber Security; Airstriopone1984; Podcast 3; Obama; Glen Beck; CNN
Downloads: 10
[texts]Global Cyber Security Market In The BFSI Sector - TechNavio
Cyber threats are web-based threats such as data theft and identity theft. They disrupt IT systems and hack critical information using malware or spyware or by phishing. 
Keywords: Global Cyber Security Market in the BFSI Sector
Downloads: 1
[movies]Senators Feinstein and Chambliss on Cyber-Security Legislation : CSPAN : November 1, 2014 11:24am-12:01pm EDT
Senators Dianne Feinstein (D) and Saxby Chambliss (R) discuss cyber-security legislation and the status of the Cybersecurity Information Sharing Act (CISA).
Keywords: Senators Feinstein and Chambliss on Cyber-Security Legislation; Television Program
Downloads: 16
[audio]14 4 9 Occupy Radio 128 - David Geitgey Sierralupe & Rivera Sun
In G-Force, the 2009 Disney movie,  a group of secret agent rodents stops a kitchen gadget robot apocalypse. In the real world, we're in no danger from weaponized blenders, but our toasters just might be used in a denial of service attack.Rivera Sun and Getch talk with computer security, and privacy specialist, Bruce Schneier. We get the scoop on the latest from the NSA, as well as the security vulnerabilities in the vast internet of things, this week on Occupy Radio.
Keywords: bruce schneier internet things cyber security state corruption nsa
Downloads: 2
[audio]'Staying Ahead of the Cyber Security Game' with Sogeti's Erik van Ommeren (Part 1) - Sogeti UK
Erik van Ommeren, Director of Innovation and co-author of our latest publication 'Staying Ahead in the Cyber Security Game' has a discussion with Sogeti UK's Marketing Manager, Samantha Mills. In this short podcast, Erik shares the trends, opportunities and threats we are currently seeing in the security landscape and explores important themes from his new book, using examples throughout.
Keywords: sogeti; sogeti uk; innovation; cyber security; security; erik van ommeren
Downloads: 16
[audio]Cyber Frontiers - Sony Hackers, Cyber Attackers, Data Breaches of 2014 and Sentiment Analysis Code To Let Us Know How Everyone Else Feels About It All – CF015 - Jim Collison
This week on Cyber Frontiers Ashton, Christian, and Jim have the conversation everyone else has been – Sony! We talk about what the Sony breach means for the cybersecurity field, and how it compares and contrasts to breaches of the past. We have some great conversation around what constitutes “damage” in a cyber breach, how it impacts people short term and long term, and what technology and attitudes need to change to prevent the Sony incident from repeating itself elsewhere...
Keywords: Ashton Webster; Christian Johnson; Cyber Security; Jim Collison; Podcast
Downloads: 5
[audio]Home Tech (Audio) - Amber Gott from LastPass, Heartbleed Checker Tool, Multi-Factor Authenication Options, New Android App – HGG173 - Jim Collison
Amber Gott (@lastpass), Online Community Managerfor Last Pass (https://lastpass.com/) joins Jim (@jcollison) and for show #173 of Home Tech Podcast brought to you by the Average Guy Network, part of http://thegeeksnetwork.com/ community. Amber covers what’s new at LastPass, including a move with new offices and space.  What happen during the Heartbleed outbreak and what you can do to secure your passwords better.  There are also some new Multifactor Options with LastPass and a new Android...
Keywords: Amber Gott; Cyber Security; Jim Collison; Password Security; passwords; Podcast
Downloads: 8
[texts]Hass And Associates Cyber Security Hvorfor Google Ikke Vokser - Olivia Davis
Google-sjef Larry Page kan bli tilgitt for å være i dårlig humør denne helgen. På hans selskapets Q1 2014 inntjening samtale, hans folk leverte hva han mente ville være gode nyheter: en omsetning på $ 15.4 milliarder, opp 19%. Veldig, kan svært få forretninger levere 20% vekst på milliarder i inntekter. Ved eventuelle tiltak, er Google i brann som selskap.                                      Google vokser , for sikker...
Keywords: Hass and Associates Cyber Security Hvorfor Google ikke vokser
Downloads: 15
[movies]Admiral Mike Rogers on Cyber Security : CSPAN : November 1, 2014 10:00am-11:01am EDT
Admiral Mike Rogers discusses sharing information to combat cyber threats.
Keywords: Admiral Mike Rogers on Cyber Security; Television Program
Downloads: 9
[texts]Hass And Associates Cyber Security Hvorfor Bitcoin Trenger En Markedsføringskampanje - Lisa Cotto
Bitcoin har et imageproblem . En stor en .Og det holder den virtuelle valutaen tilbake fra å gå mainstream , sa Hank Lucas , en professor ved University of Maryland , som fokuserer på disruptive teknologier ."Det er vanskelig for meg å si at Bitcoin kommer til å være den dominerende virtuell valuta for fremtiden , " Lucas sa . " Hvis noen kom opp med en virtuell valuta som folk forstått og som har en verdi ikke svinger så mye , vel , da kan det bli en vedtatt av massene og ikke Bitcoin ...
Keywords: Hass and Associates Cyber Security Hvorfor Bitcoin trenger en markedsføringskampanje
Downloads: 7
[texts]Hass and Associates Cyber Security: Portable HD 'Mirror' from LaCie - Rose Garza
Early this month, LaCie made waves when it announced "Mirror", a high-end portable hard drive with a reflective body which is absolutely stunning -- but do you really need such a thing? LaCie, Seagate's premium brand is no novice when it comes to designing sleek and classy storage products as it has already partnered with Linux and Apple before. This time, it has teamed up with French designer Pauline Deltour to develop the striking Mirror HDD...
Keywords: Hass and Associates Cyber Security: Portable HD 'Mirror' from LaCie
Downloads: 3
[movies]Dyman & Associates Risk Management Projects Targets Cyber Security Staff Raised Concerns In Months Before Breach
Target Corp.’s computer security staff raised concerns about vulnerabilities in the retailer’s payment card system at least two months before hackers stole 40 million credit and debit card numbers from its servers, people familiar with the matter said.
Keywords: Target’s Cyber Security Staff Raised Concerns in Months Before Breach; Dyman & Associates Risk Management Projects
Downloads: 13
[movies]Airstripone Podcast 3 - Airtstripone1984
Podcast 3 focuses on the notion of a cyber security threat as a pre-text to clamp down on the internet and change the web as we know it. This episode focuses on internet control and censorship. Visit our website: www.airstripone1984.wordpress.com
Keywords: Internet control; cyber security; net neutrality; podcast 3; airstripone1984; Obama; Glen Beck
Downloads: 4
[texts]Hass And Associates Cyber Security Hvorfor Facebook Og Google Kjøper Inn Droner - Christine Smith
Profitt er bak begge bedriftenes investeringer i ubemannet fly, hva gjelder de kan couch det iTilbake i de dårlige gamle dagene under den kalde krigen var en av de mest Ærede grenene av unøyaktig sciences Kremlinology. I vest, Aviser, thinktanks og regjeringer kan du beholdt spesialister hvis jobb var å granske hver skrap av bevis, sladder og ryktene kommer fra Moskva i håp om at det ville gi noen anelse om hva de sovjetiske lederne var opp til...
Keywords: Hass and Associates Cyber Security Hvorfor Facebook og Google kjøper inn droner
Downloads: 10
[audio]Cyber Frontiers - Space Networks & Cybersecurity in Healthcare with Special Guest Jay Ellis – CF011 - Jim Collison
This week we are joined by Jay Ellis, Senior Information Security Engineer and Program Manager at Stinger Ghaffarian Technologies (SGT), to talk about space networks, healthcare IT, and the networks and cybersecurity methodologies that run them. Jim, Christian, and Ashton keep the questions rolling in what promises to be a packed hour of content based on Jay’s experiences in the field.Mr. Ellis is a seasoned information technology professional with over 25 years of professional experience in t...
Keywords: Ashton Webster; Christian Johnson; Cyber Security; Jay Ellis; Jim Collison; Podcast
Downloads: 5
[movies]Cyber Frontiers (Video) - Using Big Data and Graph Theory to Map the WWW – CF016 - Jim Collison
This week Ashton and Christian kick off the new year by discussing plans to launch the first major cybersecurity research project on the development sandbox: mapping the internet with traceroute, distributed Nmap, and Hadoop. We discuss strategies and design challenges that will be present early on in development and potential solutions that may be employed. Furthermore, we tie back the project to the latest developments in the North Korea cyber fiasco with Sony Corporation...
Keywords: Podcast; Jim Collison; Christian Johnson; Ashton Webster; Big Data; Cyber Security
Downloads: 14
[audio]Cyber Frontiers - UMD Data Breach, Securing PII Data, Two Factor Authentication, Tinder GPS Flaw, Intro to Honeypots – CF002 - Jim Collison
Christian Johnson (@TheWizBM) joins Jim (@jcollison) for show #2 of Cyber Frontiers brought to you by the Average Guy Network.Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does.  Never on a schedule, but always up to date!You can contact us via email at jim@theavera...
Keywords: Honeypots; Securing PII Data; Tinder GPS Flaw; Two Factor Authentication; UMD Data Breach; cyber security
Downloads: 6
[audio]Cyber Frontiers - The Multi-Disciplinary Approach to Cybersecurity, Security Technologies, and the Privacy Issues Surrounding Us All – CF003 - Jim Collison
Christian Johnson (@TheWizBM) joins Jim (@jcollison) for show #3 of Cyber Frontiers brought to you by the Average Guy Network.Attention: This is the last time Cyber Frontiers will be the Home Gadget Geeks feed.  Subscribe on iTunes athttps://itunes.apple.com/us/podcast/cyber-frontiers-average-guy/id857124890 or RSS athttp://theaverageguy.tv/category/tagpodcasts/cyberfrontiers/feed or on Stitcher at http://www.stitcher.com/podcast/home-tech-podcast/cyber-frontiersCyber Frontiers is all about ...
Keywords: Christian Johnson; Cyber Security; Jim Collison; Multi-Disciplinary Approach; Podcast; Privacy
Downloads: 3
[audio]Cyber Frontiers - Exploring Cyber Security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective - CF001 - Jim Collison
Christian Johnson (@TheWizBM) joins Jim (@jcollison) for show #1 and the Pilot of Cyber Frontiers brought to you by the Average Guy Network.Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does.  Never on a schedule, but always up to date!You can contact us via email a...
Keywords: Big Data; Christian Johnson; Cyber Security; Jim Collison; University of Maryland
Downloads: 7
[audio]Cyber Frontiers - Exploring Big Data Through the Twitterverse – CF013 - Jim Collison
This week Ashton and Christian begin an exciting, multi-part series on how to leverage big data technologies to learn new skills in data analytics using one of the world’s cheapest and largest value data sources – tweets! We take a look at the Twitter Streaming API, techniques for collecting and storing these data sets, and basic visualization exercises in Java and HTML5. We also take a look at some automated Twitter interactions using Python scripting and basic rule sets...
Keywords: Ashton Webster; Big Data; Christian Johnson; Cyber Security; Jim Collison; Podcast; Storm; twitter
Downloads: 2
[audio]Cyber Frontiers - Building a Big Data Development Environment on the Cheap, Virtualization Tech & SDN, and the Big Bad ShellShock – CF009 - Jim Collison
This week on Cyber Frontiers, Christian Johnson and Ashton Webster, joined by Jim Collison, talk about how to setup a multi-node distributed Hadoop cluster on a single box. The discussion on the technology quickly dives into newer technology in virtualization in SDN, and we even get a little bit of time to talk about the relevancy of the shellshock news to our big data research on the show. This should be a treat to newcomers in the big data space as well as veteran data geeks!Cyber Frontiers is...
Keywords: Ashton Webster; Big Data; Christian Johnson; Cyber Security; Jim Collison; Podcast; ShellShock
Downloads: 5
[audio]Science of Cyber Security: Fred Chang, 21CT
Fred Chang of 21CT talks about injecting science in cyber security in order for us to become more proactive in our defense postures. 21CT provides investigative analytics and pattern detection solutions for cyber security and fraud.
Keywords: cyber security; network security; data security; 21CT; analytics; big data; security data analytics
Downloads: 27
[audio]For Your Ears Only (On Air) 08/05/2012 - David Alpern
Romney's Rough Trip, No Matter Who Wins, Cyber Insecurity, Pursuing Child Porn, Olympics TV Gripes, Archive: Iran Threatening and Threatened - (8/07/11)Lineup: I. BILLBOARD II. ROMNEY'S ROUGH TRIP Craig Shirley, Republican public affairs consultant, Reagan biographer, author of "December 1941: 31 Days that Changed America and Saved the World." III. NO MATTER WHO WINS Kennth Lipper, investment expert, former NYC Deputy Mayor for Finance, Lipper & Co...
Keywords: Romney; Gaffes; Obama; Budget; Cyber Security; CEI; Child Porn; Olympics; NBC; TV
Downloads: 2
[audio]Home Tech (Audio) - Catching Up with Christian After His First Year at University of Maryland – HT170 - Jim Collison
Christian Johnson (@TheWizBM) joins Jim (@jcollison) for show #170 of Home Gadget Geeks brought to you by the Average Guy Network, part ofhttp://thegeeksnetwork.com/.  Christian has had a very busy spring and hasn’t been on the show in a while.  News of the data breach broke in February 2014 and Christian was selected to be on the Presidents Task Force on Cyber Security at University of Maryland.  A complete outline of the events can be found at http://www.umd.edu/datasecurity/.Support the...
Keywords: ACES; Christian Johnson; Cyber Security; Jim Collison; Podcast; University of Maryland
Downloads: 8
[1] 2 3 4 5 6 7 8 9     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

audio
texts
movies

Terms of Use (31 Dec 2014)